Business Processes- SecureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Business Processes- Secure returned the following results.
RSS What is RSS?
Related Categories

 •   Business Process Management (BPM)
 •   Business Intelligence Solutions
 •   Data Security
 •   Business Process Automation
 •   Network Security
 •   Security Policies
 •   Endpoint Security
 •   Enterprise Information Integration/ Metadata Management
 •   Business Process Outsourcing
 •   Application Security

Related Searches
 •   Advantages Of Business Processes- Secure
 •   Business Capacity
 •   Business Processes- Designing
 •   Business Processes- Order
 •   Business Processes- Simple
 •   Business Purchasing
 •   Business Terms
 •   Distribution Business
 •   Operating Business Processes- Secure
 •   Template Business Processes- Secure
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
The Impact of Technology on Cost in Business Process Outsourcing (BPO) by SAP America, Inc..
Gain insight into the true cost of business process outsourcing (BPO) beyond what is typically reflected in the BPO provider's service price (total contract value). Learn more...
>> Discover more offerings from SAP America, Inc..

Five Truths About Enterprise Data Protection by PGP Corporation

December 22, 2008 - (Free Research)
How can your business secure data that is always on the move? Read this paper to learn valuable information for securing your data with an enterprise-wide data encryption strategy. 
(WHITE PAPER) READ ABSTRACT |

How Financial Firms Can Improve Business Integration Capabilities and Increase Straight-Through Processing Efficiency by Sterling Commerce, An IBM Company

September 01, 2009 - (Free Research)
This white paper discusses the increased demand placed on financial services organizations to improve their straight-through processing (STP) levels across all business units. 
(WHITE PAPER) READ ABSTRACT |

15-Minute Guide to Instant Document Management by EMC Corporation

August 02, 2010 - (Free Research)
Learn how a small-scale solution such as EMC Documentum ApplicationXtender can automate business processes quickly, easily, and affordably. A modest size is no reason to be saddled with the low productivity, increased risk, and high operational costs imposed by manual, paper-based processes. 
(WHITE PAPER) READ ABSTRACT |

Secure Internet Single Sign-On (SSO) 101 by Ping Identity Corporation

June 08, 2009 - (Free Research)
Written for anyone interested in understanding how secure Internet SSO works, this white paper explores the limitations of current SSO implementations outside of a single security domain (including identity and access management systems and open source development) and introduces standalone secure Internet SSO as a solution. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Internet Single Sign-On (SSO) by Ping Identity Corporation

June 05, 2009 - (Free Research)
This white paper describes why and how any organization can implement secure Internet single sign-on, which provides for the portability and interoperability of identity information across organizational boundaries. Read this white paper to learn the five steps to secure internet single sign-on. 
(WHITE PAPER) READ ABSTRACT |

Forum Sentry™ - Web Services Security Gateway - Drive Return on Investment by Forum Systems

Forum Sentry™ provides a security infrastructure that drives a return on investment by enabling secure XML and Web services communications for mission critical applications. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

E-Book: Technical Guide on Application Security: Secure Development by IBM

December 07, 2010 - (Free Research)
When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization. 
(EBOOK)

CyberFusion Integration Suite (CFI) by Proginet Corporation

CyberFusion Integration Suite (CFI), from Proginet, is the world's most advanced managed file transfer solution. CFI helps organizations overcome the fundamental challenges they face every day as they strive to secure, control, and integrate the data that drives their business. 
(SOFTWARE PRODUCT)

The Alcatel-Lucent OmniAccess 8550 WebServices Gateway: AUTOMATED WORKFLOW FOR IMPROVED PAT IENT CARE by Alcatel-Lucent

April 2008 - (Free Research)
The Alcatel-Lucent OmniAccess 8550 Web Services Gateway is a network appliance that secures automated business processes to meet corporate governance obligations. 
(WEBCAST) READ ABSTRACT |

Enhance and secure critical business operations with end-to-end, business-driven security solutions by IBM

June 2010 - (Free Research)
Securing IT assets is a top priority for organizations of all sizes, across all industries. Read this paper and learn how to help mitigate enterprise security risks by leveraging IBM solutions to drive business innovation and success, while reducing complexity and costs along the way. 
(WHITE PAPER) READ ABSTRACT |

Cisco Secure Remote Access Solution by Cisco Systems, Inc.

July 2008 - (Free Research)
This demo shows how the Cisco Secure Remote Access Solution provides simple access from virtually anywhere while protecting endpoint systems data and internal resources. 
(DEMO) READ ABSTRACT |

Network Foundation - Cisco 1700 Series by Cisco Systems

Cisco 1700 Series modular routers are ideal for enterprise small branch offices and small and medium-sized businesses that need secure access to business applications, network resources, and Internet services. The Cisco 1700 Series delivers fast, reliable and secure Internet/network access through a wide-range of high-speed WAN access technologies. 
(HARDWARE PRODUCT)

Workday Security: An Application Perspective by Workday

October 2008 - (Free Research)
Read this white paper to learn about the innovative security features of Workday products, which focus on user authentication, authorization, and validation. 
(WHITE PAPER) READ ABSTRACT |

Protecting Essential Information: Securing the Foundation of the Internet Business Platform by Websense, Inc.

August 2009 - (Free Research)
The requirements for Web security, email security, and data loss prevention have changed. Read on to learn where and why traditional approaches fail; how accuracy and context drive effective information-focused security; and what to do to protect essential information and say yes to business processes that take advantage of Web 2.0. 
(WHITE PAPER) READ ABSTRACT |

The Five Productivity Benefits of a Secure Network by Cisco Systems, Inc.

October 2008 - (Free Research)
A secure network foundation from Cisco enables you to easily and cost-effectively add new users and applications as needed. 
(WHITE PAPER) READ ABSTRACT |

Market Trends - Secure File Sharing and Collaboration in the Enterprise by Accellion, Inc.

February 2014 - (Free Research)
This report by Forrester Analyst Heidi Shey showcases workforce behaviors and trends that are hastening demand for secure file sharing and collaboration solutions. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Cloud Compliance, Secure Backup, and Successful Information Management by SearchSecurity.com

July 2013 - (Free Research)
This E-Guide explores the keys to maintaining control over increasingly large data sets from a compliance, backup and information management perspective. 
(EGUIDE) READ ABSTRACT |

Is your data center holding you back? by HP

October 2011 - (Free Research)
Access this essential resource to discover five crucial steps to jump-start business and IT agility by becoming an instant-on enterprise, including planning, standardizing, virtualizing, and more. 
(WHITE PAPER) READ ABSTRACT |

Business Continuity Management by Matrix42

September 2008 - (Free Research)
This White paper explains the concept of Business Continuity and demonstrates how matrix42 Empirum supports the Business Continuity Strategy in the enterprise. 
(WHITE PAPER) READ ABSTRACT |

Transform Your Desktop into a Virtual Workspace using Cisco VXI with VMware View - Presentation Transcript by VMware, Inc.

December 2011 - (Free Research)
Read this resource to learn how Cisco and VMware are partnering to improve business process outsourcing, delivering a secure environment with a new virtual workspace that unifies virtual desktops, voice, and video. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Solution Brief: IBM InfoSphere Optim Data Growth Solution Solution Brief by IBM

April 2011 - (Free Research)
Manage continued data growth to drive business results: Align application performance with business processes to meet service levels Segregate inactive application data from current activity and safely move it to a secure archive Archive, manage and retail. 
(WHITE PAPER) READ ABSTRACT |

Will Your Company Benefit from Fax Servers and Electronic Document Delivery? by OpenText

October 2010 - (Free Research)
This paper discusses how efficient, secure and cost-effective distribution of this business information can have a significant impact on overall business performance by extending process efficiencies. That’s where fax server software can provide a business edge. Read on to learn if your company can benefit from automating document delivery. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Managed Public Key Infrastructure: Securing Your Business Applications by VeriSign EMEA

December 2005 - (Free Research)
The VeriSign® Managed PKI service is an outsourced offering that enables enterprises of any size to rapidly and confidently deploy PKI services. It alleviates the burden of planning, building, and maintaining a PKI, while allowing enterprises to maintain internal control over digital-certificate issuance, suspension, and revocation. 
(WHITE PAPER) READ ABSTRACT |

Secure File Transfer in the Era of Compliance by Ipswitch WhatsUp Gold

July 2007 - (Free Research)
Regulatory compliance mandates are forcing organizations to document all their business processes. This white paper outlines a new class of file transfer solutions, which provide secure and reliable exchange of business information. 
(WHITE PAPER) READ ABSTRACT |

Faster, Cheaper, Safer: Improving Agility, TCO, and Security with Agentless Job Scheduling by BMC Software, Inc.

April 2009 - (Free Research)
Enterprise job scheduling is a mature and mission-critical IT capability that supports some of the most important business processes throughout a modern enterprise. This EMA whitepaper will review the implementation and benefits of agentless job scheduling. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts